Allison Cramer – BMC Blogshttp://www.bmc.com/blogs
BMC SoftwareThu, 24 May 2018 08:49:51 +0000en-UShourly1http://blogs.bmc.com/wp-content/uploads/2016/04/bmc_favicon-300x300-150x150.pngAllison Cramer – BMC Blogshttp://www.bmc.com/blogs
3232How Changes to the EU’s General Data Protection Regulation Impact Your Businesshttp://www.bmc.com/blogs/changes-eus-general-data-protection-plan-regulation-impact-business/
Thu, 15 Jun 2017 09:38:17 +0000http://www.bmc.com/blogs/?p=10709The clock is ticking As digital business expands and consumers increase their online activities, protecting privacy and ensuring security is more important than ever. The EU General Data Protection Regulation (GDPR) becomes effective in May 2018, with new regulations to meet these challenges. If you conduct business with EU customers, you’ll need to comply with […]]]>10 Surprising Findings about Operationalizing Securityhttp://www.bmc.com/blogs/10-surprising-findings-operationalizing-security/
Mon, 05 Jun 2017 14:00:48 +0000http://www.bmc.com/blogs/?p=10451The news headlines and social media comments about IT security vulnerabilities remain consistent – and they may cause you to take a closer look at what can be done to protect your organization. It seems like “another day, another data breach, another cyber attack, and another failed security audit.” Fortunately, there are steps you can […]]]>Vulnerability Remediation – to the Cloud and Beyond!http://www.bmc.com/blogs/tackling-vulnerability-remediation-across-multiple-platforms-bmc-secops-response-service/
Wed, 03 May 2017 09:29:20 +0000http://www.bmc.com/blogs/?p=10425Understanding and managing risk Security teams often use a variety of vulnerability management and response tools to assess and address the vulnerability situation across the organization, frequently using different sets of tools for different environment types. This often makes getting a single picture of the current risk profile difficult as they try to stitch together […]]]>Confessions of a “Hacker” and How to Protect Your Enterprisehttp://www.bmc.com/blogs/confessions-hacker-protect-enterprise/
Thu, 19 Jan 2017 04:38:02 +0000http://www.bmc.com/blogs/?p=10046In the Art of War, legendary strategist Sun Tzu speaks of the necessity of understanding your enemy – not just at a superficial level, but also to know how they think. If you had the chance to pick the brain of a hacker to learn more about how hackers work and what you can do […]]]>The Service Desk Just Became Even More Powerful and Securehttp://www.bmc.com/blogs/service-desk-just-became-even-powerful-secure/
Thu, 05 Jan 2017 01:27:55 +0000http://www.bmc.com/blogs/?p=10045If your IT organization is like most enterprises, you’ve seen how the demands of digital business put greater pressure on the service desk to become more efficient and responsive, while continuing to drive down costs. Plus, you have to do all of this at a time when hacking is on the rise and threatens the […]]]>6 Reasons Why Cyber Crime Is Increasing – And What You Can Do About Ithttp://www.bmc.com/blogs/6-reasons-cyber-crime-increasing-can/
Mon, 12 Dec 2016 01:08:08 +0000http://www.bmc.com/blogs/?p=9955If you’re like most people, you probably lock the doors of your home or apartment when you’re not there. It’s easy to do, is a cultural norm, and reduces the chance of having a criminal break in. It’s a standard practice that leaves you less vulnerable to intruders. Now, take that same thought and apply […]]]>